phplugins / Leaked_Malware_SourceCodeLinks
☆18Updated 9 years ago
Alternatives and similar repositories for Leaked_Malware_SourceCode
Users that are interested in Leaked_Malware_SourceCode are comparing it to the libraries listed below
Sorting:
- Windows Malware☆41Updated 12 years ago
- ☆26Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Simple Remote Access Trojan☆23Updated 8 years ago
- D-RAT SRC Extract☆12Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- ☆19Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Citadel 1.3.5.1☆28Updated 12 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- SideEffect Keylogger☆13Updated 8 years ago
- KINS Banking Trojan☆63Updated 10 years ago
- Shellcode tracer☆15Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- ☆45Updated 8 years ago
- Anti-AV compilation☆44Updated 11 years ago
- The educational Animus malware☆18Updated 5 years ago
- MALM: Malware Monitor☆50Updated 12 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago